I am trying to sync the Ubuntu trusty repo to my cobbler server. The issue is that for some reason the connection seems unstable during the parts that work.. additionally it fails to proceed with one ...

I have a customer whose application workflow relies on gnupg (gpg). Their system was recently migrated from CentOS 5.x, which shipped with gnupg version 1, to CentOS 6.5, which has gnupg version 2.
...

I am using the following steps to import keys into GPG
Open prompt and fire import KEY command
Fire --edit-key KEY_NAME
Type trust and type 5 save
Place gpg.conf file at %APPDATA%/Roaming/gnupg and ...

I'm using the HP SDR system (MCP specifically) for Linux packages to manage the HP hardware RAID, iLo, etc. The kernel drivers for the hardware are upstream, so these are just management utilities.
...

I am trying to decrypt multiple files to a different directory keeping the existing filenames. When i run the below syntax it seems to decrypt them ok but it only ouputs to the screen. I would like to ...

I'm trying to set up a repo that contains both CentOS 6.4 and 5.9 packages. The machine itself is 6.4.
I've created a GPG key and have been able to sign my 6.4 packages no problem. When I create them ...

I've searched high and low trying to find a method that allows me to store GPG keys for existing users in an OpenLDAP server. The only relevant how-to I've found is this. However, I'm unable to get ...

I need to perform onsite backups of hundreds of gigabytes from a few Xen VMs to some storage available on a dedicated server in the same network, with a Gigabit connection. The data is mostly MySQL ...

I'm trying to run use the gpg tool to encrypt and decrypt files and I would like to know if it's possible to run this tool without it changing a user's global state. Specifically, running gpg for the ...

I am running CentOS 6.3.
I have a tool that monitors md5sum hashes for system binaries, and emails me whenever there is a change. Obviously whenever I run updates to the system via yum, this md5sum ...

When i try to install or update any packages I get:
Untrusted packages could compromise your system's security.
You should only proceed with the installation if you are certain that
this is what you ...

I've tried a number of obvious commands as detailed in Duplicity Man page to do this but doesn't seem to work.
Scenario
I'm SSH'ing to a machine, then running Duplicity; below is the CMD, of sorts:-
...

We recently upgraded the server we use to gpg encrypt files with public key encryption.
Old server had gnupg version 1.2.6.
On the new server, gnupg version 2.0.18, we imported our gpg keyring from ...

I'm developing a web app which emails encrypted data (from a web form) to a client who uses Macs/OSX exclusively in their office.
I'd like to know: Is there are any reliable solutions for PGP / GnuPG ...

I've been asked to configure webmail for a company whose business is centred around their intellectual property - which is the rationale why we're using webmail, and not a client based email reader to ...

An employee will be leaving our company, and we have a directory tree containing a number of files, each holding a password for a specific service, and each file is encrypted to those who require it.
...

I currently have a SSH key that I've used for a while and I'd like to start using GnuPG with a new keyring. However, given that I've used my key for ages, I would like to still use that key in GPG as ...

We would like to use gpg signatures to verify some aspects of our
system configuration management tools. Additionally, we would like to
use a "trust" model where individual sysadmin keys are signed ...